-
1
-
-
0037403111
-
Mirror descent and nonlinear projected subgradient methods for convex optimization
-
Beck, A., Teboulle, M.: Mirror descent and nonlinear projected subgradient methods for convex optimization. Oper. Res. Lett. 31(3), 167-175 (2003)
-
(2003)
Oper. Res. Lett.
, vol.31
, Issue.3
, pp. 167-175
-
-
Beck, A.1
Teboulle, M.2
-
2
-
-
85047802462
-
A learning theory approach to non-interactive database privacy
-
Blum, A., Ligett, K., Roth, A.: A learning theory approach to non-interactive database privacy. In: STOC (2008)
-
STOC (2008)
-
-
Blum, A.1
Ligett, K.2
Roth, A.3
-
3
-
-
33947416035
-
Near-optimal signal recovery from random projections: Universal encoding strategies?
-
Candes, E.J., Tao, T.: Near-optimal signal recovery from random projections: universal encoding strategies? IEEE Transactions on Information Theory (2006)
-
(2006)
IEEE Transactions on Information Theory
-
-
Candes, E.J.1
Tao, T.2
-
5
-
-
1142275486
-
Revealing information while preserving privacy
-
ACM
-
Dinur, I., Nissim, K.: Revealing information while preserving privacy. In: PODS, pp. 202-210. ACM (2003)
-
(2003)
PODS
, pp. 202-210
-
-
Dinur, I.1
Nissim, K.2
-
6
-
-
33746037200
-
Our Data, Ourselves: Privacy Via Distributed Noise Generation
-
Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
-
Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our Data, Ourselves: Privacy Via Distributed Noise Generation. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 486-503. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 486-503
-
-
Dwork, C.1
Kenthapadi, K.2
McSherry, F.3
Mironov, I.4
Naor, M.5
-
7
-
-
33745556605
-
Calibrating Noise to Sensitivity in Private Data Analysis
-
Halevi, S., Rabin, T. (eds.) TCC 2006. Springer, Heidelberg
-
Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating Noise to Sensitivity in Private Data Analysis. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 265-284. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 265-284
-
-
Dwork, C.1
McSherry, F.2
Nissim, K.3
Smith, A.4
-
8
-
-
35449000081
-
The price of privacy and the limits of LP decoding
-
ACM
-
Dwork, C., McSherry, F., Talwar, K.: The price of privacy and the limits of LP decoding. In: STOC, pp. 85-94. ACM (2007)
-
(2007)
STOC
, pp. 85-94
-
-
Dwork, C.1
McSherry, F.2
Talwar, K.3
-
10
-
-
0003773292
-
A simple algorithm for constructing szemere'di's regularity partition
-
Frieze, A.M., Kannan, R.: A simple algorithm for constructing szemere'di's regularity partition. Electr. J. Comb. (1999)
-
(1999)
Electr. J. Comb.
-
-
Frieze, A.M.1
Kannan, R.2
-
11
-
-
65449162734
-
Composition attacks and auxiliary information in data privacy
-
ACM
-
Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: KDD 2008: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 265-273. ACM (2008)
-
(2008)
KDD 2008: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 265-273
-
-
Ganta, S.R.1
Kasiviswanathan, S.P.2
Smith, A.3
-
12
-
-
79959740503
-
Privately releasing conjunctions and the statistical query barrier
-
Gupta, A., Hardt, M., Roth, A., Ullman, J.: Privately releasing conjunctions and the statistical query barrier. In: STOC (2011)
-
STOC (2011)
-
-
Gupta, A.1
Hardt, M.2
Roth, A.3
Ullman, J.4
-
13
-
-
84862613309
-
Iterative constructions and private data release
-
abs/1107.3731
-
Gupta, A., Roth, A., Ullman, J.: Iterative constructions and private data release. CoRR, abs/1107.3731 (2011)
-
(2011)
CoRR
-
-
Gupta, A.1
Roth, A.2
Ullman, J.3
-
14
-
-
84862602417
-
A simple and practical algorithm for differentially private data release
-
abs/1012.4763
-
Hardt, M., Ligett, K., McSherry, F.: A simple and practical algorithm for differentially private data release. CoRR, abs/1012.4763 (2010)
-
(2010)
CoRR
-
-
Hardt, M.1
Ligett, K.2
McSherry, F.3
-
15
-
-
78751489078
-
A multiplicative weights mechanism for privacy-preserving data analysis
-
Hardt, M., Rothblum, G.N.: A multiplicative weights mechanism for privacy-preserving data analysis. In: FOCS (2010)
-
FOCS (2010)
-
-
Hardt, M.1
Rothblum, G.N.2
-
17
-
-
84865292260
-
On the duality of strong convexity and strong smoothness: Learning applications and matrix regularization
-
Kakade, S.M., Shalev-Shwartz, S., Tewari, A.: On the duality of strong convexity and strong smoothness: Learning applications and matrix regularization. Informal Publication (2009)
-
(2009)
Informal Publication
-
-
Kakade, S.M.1
Shalev-Shwartz, S.2
Tewari, A.3
-
18
-
-
57949111704
-
What can we learn privately?
-
Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? In: FOCS (2008)
-
FOCS (2008)
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
19
-
-
77954745685
-
Interactive privacy via the median mechanism
-
Roth, A., Roughgarden, T.: Interactive privacy via the median mechanism. In: STOC (2010)
-
STOC (2010)
-
-
Roth, A.1
Roughgarden, T.2
-
20
-
-
84865292263
-
On the universality of online mirror descent
-
abs/1107.4080
-
Srebro, N., Sridharan, K., Tewari, A.: On the universality of online mirror descent. CoRR, abs/1107.4080 (2011)
-
(2011)
CoRR
-
-
Srebro, N.1
Sridharan, K.2
Tewari, A.3
-
21
-
-
84865294216
-
Introduction to the non-asymptotic analysis of random matrices
-
abs/1011.3027
-
Vershynin, R.: Introduction to the non-asymptotic analysis of random matrices. CoRR, abs/1011.3027 (2010)
-
(2010)
CoRR
-
-
Vershynin, R.1
-
22
-
-
33645035051
-
Model selection and estimation in regression with grouped variables
-
Yuan, M., Lin, Y.: Model selection and estimation in regression with grouped variables. Journal of the Royal Statistical Society, Series B 68, 49-67 (2007)
-
(2007)
Journal of the Royal Statistical Society, Series B
, vol.68
, pp. 49-67
-
-
Yuan, M.1
Lin, Y.2
|